• 제목/요약/키워드: Security operation center

검색결과 142건 처리시간 0.022초

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • 제15권2호
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

Stewart Platform-Based Master System for Tele-Operation of a Robot Arm (로봇 팔의 원격제어를 위한 스튜어트 플랫폼 기반의 조작장치)

  • Lee, Sang-Duck;Yu, Hong-Sun;Ahn, Kuk-Hyun;Song, Jae-Bok;Kim, Jong-Won;Ryu, Jae-Kwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • 제39권2호
    • /
    • pp.137-142
    • /
    • 2015
  • Teleoperation of a robot arm working in hazardous environments has been studied in the field of defense and security. A master system is an essential part that plays an important role in the teleoperation. We developed a master system, which is an essential part in the teleoperation, so that it can operate the slave robot arm intuitively and has excellent mobility and portability compared to conventional master systems. The master system adopted a Stewart platform to minimize the size and weight, and the legs of the Stewart platform are composed of wires to improve the operation range of the system. The experimental validation of the developed master system is conducted with a commercial IMU, and the experimental results show that the proposed master system can perform reliable and dexterous teleoperation.

A Fast Inversion for Low-Complexity System over GF(2 $^{m}$) (경량화 시스템에 적합한 유한체 $GF(2^m)$에서의 고속 역원기)

  • Kim, So-Sun;Chang, Nam-Su;Kim, Chang-Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • 제42권9호
    • /
    • pp.51-60
    • /
    • 2005
  • The design of efficient cryptosystems is mainly appointed by the efficiency of the underlying finite field arithmetic. Especially, among the basic arithmetic over finite field, the rnultiplicative inversion is the most time consuming operation. In this paper, a fast inversion algerian in finite field $GF(2^m)$ with the standard basis representation is proposed. It is based on the Extended binary gcd algorithm (EBGA). The proposed algorithm executes about $18.8\%\;or\;45.9\%$ less iterations than EBGA or Montgomery inverse algorithm (MIA), respectively. In practical applications where the dimension of the field is large or may vary, systolic array sDucture becomes area-complexity and time-complexity costly or even impractical in previous algorithms. It is not suitable for low-weight and low-power systems, i.e., smartcard, the mobile phone. In this paper, we propose a new hardware architecture to apply an area-efficient and a synchronized inverter on low-complexity systems. It requires the number of addition and reduction operation less than previous architectures for computing the inverses in $GF(2^m)$ furthermore, the proposed inversion is applied over either prime or binary extension fields, more specially $GF(2^m)$ and GF(P) .

A improved authentication protocol for the forward security (개선된 포워드 보안을 위한 인증 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • 제12권4호
    • /
    • pp.17-27
    • /
    • 2007
  • This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In the proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. And another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even an attacker steals the parameters from the KDC, the attacker still can not calculate session key. According to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.

  • PDF

Study of Information Hiding Methods for SONAR Images in the Naval Combat System (정보은닉기법을 적용한 함정 전투체계 소나 영상의 정보관리 방안 연구)

  • Lee, Joon-Ho;Shin, Sang-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • 제18권6호
    • /
    • pp.779-788
    • /
    • 2015
  • The SONAR waterfall image(SWI) is used typically to target detection in SONAR operation and is managed with additional data linked in the naval combat system. The SWI and additional data are very important to classify a kind of target. Although additional data of the SWI is essential and must be kept together with the SWI, it was stored separately in the current system. In this paper, we propose an improved information management method in the naval combat system, where additional data can be contained in the SWI together by using information hiding techniques. The experimental results show that the effectiveness of information hiding techniques in the naval combat system. It is demonstrated that the information hiding techniques can be applied to the SWI that can make the naval combat system to be robust and secure.

A Knowledge Workers Acquisition Problem under Expanding and Volatile Demand: An Application of the Korean Information Security Service Industry

  • Park, Hyun-Min;Lim, Dae-Eun;Kim, Tae-Sung;Kim, Kil-Hwan;Kim, Soo-Hyun
    • Management Science and Financial Engineering
    • /
    • 제17권1호
    • /
    • pp.45-63
    • /
    • 2011
  • The aim of this paper is to consider the process of supplying trained workers with knowledge and skills for upcoming business opportunities and the process of training apprentices to be prepared to meet future demands in an IT service firm. As the demand for new workers fluctuates, a firm should employ a buffer workforce such as apprentices or interns. However, as a result of rapid business development, the capacity of the buffer may be exceeded, thus requiring the company to recruit skilled workers from outside the firm. Therefore, it is important for a firm to map out a strategy for manpower planning so as to fulfill the demands of new business and minimize the operation costs related to training apprentices and recruiting experienced workers. First, this paper analyzes the supply and demand of workers for the IT service in a knowledge-intensive field. It then presents optimal human resource planning strategies via the familiar method of stochastic process. Also, we illustrate that our model is applied to the human resource planning of an information security service firm in South Korea.

Development of Smart Device Module for Perimeter Intrusion Detection (외곽 침입 감지를 위한 스마트 디바이스의 개발)

  • Ryu, Dae-Hyun;Choi, Tae-Wan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제16권2호
    • /
    • pp.363-370
    • /
    • 2021
  • The perimeter intrusion detection system is very important in physical security. In this study, a micro smart device (module) using MEMS sensor was developed in IoT environment for external intrusion detection. The outer intrusion detection system applying the smart device developed in this study is installed in various installation environments, such as barbed wire of various materials and shapes, the city center, the beach, and the mountain, so that it can detect external intrusion and its location as well as false alarms. As a smart sensor that can minimize the false alarm rate and economical construction cost, it is expected that it can be used for the safe operation of major facilities and prevention of disasters and crimes.

The impact of modern airport security protocols on patients with total shoulder replacements

  • Michael D. Scheidt;Neal Sethi;Matthew Ballard;Michael Wesolowski;Dane Salazar;Nickolas Garbis
    • Clinics in Shoulder and Elbow
    • /
    • 제26권4호
    • /
    • pp.416-422
    • /
    • 2023
  • Background: Advancements in airport screening measures in response to 9/11 have resulted in increased false alarm rates for patients with orthopedic and metal implants. With the implementation of millimeter-wave scanning technology, it is important to assess the changes in airport screening experiences of patients who underwent total shoulder arthroplasty (TSA). Methods: Here, 197 patients with prior anatomic and reverse TSA completed between 2013 and 2020 responded to a questionnaire regarding their experiences with airport travel screening after their operation. Of these patients, 86 (44%) stated that they had traveled by plane, while 111 (56%) had not. The questionnaire addressed several measures including the number of domestic and international flights following the operation, number of false alarm screenings by the millimeter-wave scanner, patient body habitus, and presence of additional metal implants. Results: A total of 53 patients (62%) responded "yes" to false screening alarms due to shoulder arthroplasty. The odds of a false screening alarm for patients with other metal implants was 5.87 times that of a false screening alarm for patients with no other metal implants (P<0.1). Of a reported 662 flights, 303 (45.8%) resulted in false screening alarms. Greater body mass index was not significantly lower in patients who experienced false screening alarms (P=0.30). Conclusions: Patients with anatomic and reverse TSA trigger false alarms with millimeter-wave scanners during airport screening at rates consistent with prior reports following 9/11. Patient education on the possibility of false alarms during airport screening is important until improvements in implant identification are made. Level of evidence: IV.

The study about operation condition of dental hospital and clinics used public data : focus on population of local autonomous entity (공공데이터를 활용한 치과병의원 운영실태 연구: 광역자치단체와 특별자치단체의 인구를 중심으로)

  • Yu, Su-Been;Song, Bong-Gyu;Yang, Byoung-Eun
    • The Journal of the Korean dental association
    • /
    • 제54권8호
    • /
    • pp.613-629
    • /
    • 2016
  • This study assayed regional distribution of dental hospital & dental clinics, the number of population & households per one dental hospital & clinic, operation condition & duration. This study used public data that display from 1946 years(the first dental clinic open in republic of korea) to 2016 years. We collected present condition of 21,686 dental hospital and clinics available in public data portal site on 28. Feb.2016. Data were classified by scale, location, permission year, operation duration of dental hospital & clinics and were analyzed using SPSS 20.0 program. Surveyed on Feb. 2016. Best top 10 regions of permission dental clinics are (1) Gangnam-gu, Seoul(1,337), (2) Seongnamsi, Gyeonggi-do(555), (3) Songpa-gu, Seoul(491), (4) Yeongdeungpo-gu, Seoul(472), (5) Suwon-si, Gyeonggi-do(443), (6) Seocho-gu, Seoul(428), (7) Nowon-gu, Seoul(417), (8) Goyang-si, Gyeonggi-do(413), (9) Jung-gu, Seoul(380), (10) Yongin-si, Gyeonggi-do(353). Whereas best top 10 regions of operating dental clinics are (1) Gangnam-gu, Seoul(581), (2) Seongnamsi, Gyeonggi-do(415), (3) Suwon-si, Gyeonggi-do(382), (4) Seocho-gu, Seoul(320), (5) Changwon-si, Gyeongsangnam-do(303), (6) Songpa-gu, Seoul(295) (7) Goyang-si, Gyeonggi-do(290), (8) Bucheon-si and Yongin-si, Gyeonggi-do(262), (9) Jeonju-si, Jeollabuk-do(224). Average population per one dental hospital & clinic by regional local government are 3,120 people. Best five region of population per one dental hospital & clinic are (1) Sejong-si(5,272), (2) Gangwon-do(4,653), (3) Chungcheongbuk-do(4,513), (4) Gyeongsangbuk-do(4,490), (5) Chungcheongnam-do(4,402). Average households per one dental hospital & clinic by regional local government are 1,316 households. Best three region of households per one dental hospital & clinic are (1) Sejong-si(2,126), (2) Gangwon-do(2,057), (3) Gyeongsangbuk-do(1,946). From 1946 to 1986, permission and operating dental hospital and clinics was steadily increasing. On 1986-1990, 1991-1995, permission, operation and closure of dental hospital and clinics increase rapidly. From the 2011-2015 to 2016(present), permission, operation and closure of dental hospital and clinics is decreasing. Average operating duration of closured dental hospital and clinics are 14.054 years. We need to map of dental hospital and clinics for open and operation of one, base on analyzed results. In an era of 30,000 dentist, we should to be concerned about operation of dental clinics in the light of past operating condition.

  • PDF

Application of the Small UAV Defense System (무인항공기 대응체계 도입 방안)

  • Park, Jehong
    • Journal of Advanced Navigation Technology
    • /
    • 제21권1호
    • /
    • pp.145-152
    • /
    • 2017
  • As a popularization of small UAS to have improved flight performance and easiness of controlling, the UAS industry is increased and also small UAS is to be a new threat for airspace security of national strategic infrastructure. Rising the new threat makes the negative side effect of small UAS operation. This phenomena brought to new R&D needs "defense system" for small UAS/UAV - called Anti-Drone. The paper addressed case study of defects, accidents and threats by small UAS/UAV as world wide level, and research and development trend of UAS defense system as each technical category - CONOP (Concept of Operation), identification/recognition method and control/supremacy techniques. As a result, this suggests the direction what and where drone defense system should be applied first and required for Korean society in the view of society system (regime) and a point of view for minimizing side effect as UAS popularization.